6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
73.6%
A vulnerability exists in the User module, where if some specific contributed or custom code triggers a rebuild of the user profile form, a registered user can be granted all user roles on the site. This would typically result in the user gaining administrative access.
This issue is mitigated by the fact that it requires contributed or custom code that performs a form rebuild during submission of the user profile form.
An access bypass vulnerability exists in the Views module, where users without the “View content count” permission can see the number of hits collected by the Statistics module for results in the view.
This issue is mitigated by the fact that the view must be configured to show a “Content statistics” field, such as “Total views”, “Views today” or “Last visit”.
The same vulnerability exists in the Drupal 7 Views module (see SA-CONTRIB-2016-036).
Install the latest version:
Also see the Drupal core project page.
Saving user accounts can sometimes grant the user all roles:
Views can allow unauthorized users to see Statistics information:
Saving user accounts can sometimes grant the user all roles:
Views can allow unauthorized users to see Statistics information:
The Drupal Security Team
twitter.com/drupalsecurity
www.drupal.org/contact
www.drupal.org/node/2749333
www.drupal.org/project/drupal
www.drupal.org/project/drupal/releases/7.44
www.drupal.org/project/drupal/releases/8.1.3
www.drupal.org/security-team
www.drupal.org/security-team/risk-levels
www.drupal.org/security/secure-configuration
www.drupal.org/user/112814
www.drupal.org/user/124982
www.drupal.org/user/1852732
www.drupal.org/user/21231
www.drupal.org/user/266527
www.drupal.org/user/35733
www.drupal.org/user/36762
www.drupal.org/user/395439
www.drupal.org/user/49851
www.drupal.org/user/551886
www.drupal.org/user/65776
www.drupal.org/user/731068
www.drupal.org/user/982724
www.drupal.org/user/99340
www.drupal.org/writing-secure-code
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
73.6%